Below you can see a more detailed description of everything that the Bronze package contains and we will update the explanations and translations over time.
Asset & vulnerability management
Asset management
Asset Management is about managing all endpoints (computers, phones, and all other network equipment) that could potentially be vulnerable to attacks in order to better identify the vulnerabilities. This can also apply to software. “You can’t protect what you don’t know”.
Proactive protection
The software uses artificial intelligence that analyzes other customers to learn more and be able to anticipate problems before they arise.
Vulnerability scanning, detection, and management
All company-owned endpoints are scanned for vulnerabilities.
Hardening recommendations from the Center for Internet Security (CIS)
You will be instructed to tighten the security according to CIS standards if something is not as it should be.
Compliance reports on standards
You’ll get reports on whether and how you’re adhering to computer security standards.
End-Point Protection
Windows and macOS support
ChromeOS, iOS, and Android support
Virus and malware protection and user behavior analysis
Analysis of a user’s behavior means that the software detects deviations from the user’s “normal” behavior. For example, if the user is not used to opening Powershell on their computer, the software detects it as an anomaly.
Predictive modeling AI
Reflex protection/virtual patch
Full encryption on disk
Device manager
Homepage reputation and URL filtering
Backup
Immutable backups
Immutable means that something cannot be changed or deleted. Generally, immutable backups can only be deleted after a certain time period has passed. Immutable backups are safe from possible alteration or deletion, which means that their original integrity remains unchanged. With the advent of ransomware, having an immutable backup has been crucial for recovery. The reason is that threatening actors now regularly attack backups. With an immutable backup, the data is protected from these kinds of attacks.
Automatic three backups of all data
Double encryption is an encryption technology that enhances the security of data and digital communications. By using two separate encryption methods on an email or file, double encryption ensures secure file sharing, managed file transfers, secure web forms, and email message sending.
Double encryption significantly increases the security of sensitive files and email communications at rest and in motion. Even if malicious actors manage to crack one layer of crypto, they must still be unable to access the original data due to the second layer of crypto. This makes it much more difficult for cybercriminals to access sensitive information.
All data double-encrypted
Double encryption is an encryption technology that enhances the security of data and digital communications. By using two separate encryption methods on an email or file, double encryption ensures secure file sharing, managed file transfers, secure web forms, and email message sending. Double encryption significantly enhances the security of sensitive files and email communications at rest and in motion. Even if malicious actors manage to crack a single layer of crypto, they are still unable to access the original data due to the second layer of crypto. This makes it much more difficult for cybercriminals to access sensitive information.
Encryption keys stored in a key management system
Encrypted keys are an important part of any security system. They do everything from data encryption and decryption to user authentication. Using encrypted keys can lead to the collapse of all organizational security functionality, and the attacker can decrypt sensitive data, identify themselves as user rights holders, or give themselves access to other confidential information. Fortunately, proper management of keys and related factors can ensure the security of confidential information. Key management is the process of setting certain standards to ensure the security of encrypted keys in an organization. Key management is responsible for creating, exchanging, storing, deleting, and updating accounts. Also about access to the keys for parties.
Security and privacy ensured at the core
Role-based access control
In the security of computer systems, Role-Based Access Control or role-based security is an approach to restricting access to the system to authorized users and to implement Manditory Access Control or Discretionary Access Control. Role-based access control is a strategic access control that is defined around roles and privileges. Its elements, such as role permissions, user roles, and relationship to roles, make it easy to accomplish user tasks.
Multi-factor authentication
User self-service
Shared storage per user 20 GB
Choice of 5 storage areas
Backup and restore Exchange online, OneDrive, SharePoint, Teams